Close Menu
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing & Mental Health
  • Marketing
  • HR & Recruitment
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
X (Twitter) LinkedIn YouTube
Trending
  • As Seen on BBC Panorama – Brad Burton to Headline The South West Expo in Swindon
  • New Industrial Strategy must spark growth and opportunity for small businesses
  • Selling a business: The steps too many owners miss
  • Temperatures Soaring: Is Your Workplace Becoming Unsafe?
  • Outgrowing your MSP; businesses need a provider that scales with their growth
  • Level 7 apprenticeship funding cuts will cost UK employers over £200m
  • Groundbreaking compliance tool to futureproof UK fashion sector
  • How much experience do you need to be a FTSE 100 CEO?
X (Twitter) LinkedIn YouTube
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing
  • Marketing
  • HR & Recruitment
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • Twitter
  • LinkedIn
  • YouTube
  • RSS
You are at:Home»Technology»How to protect company data on personal devices

How to protect company data on personal devices

3
Posted By sme-admin on February 18, 2025 Technology

It is estimated that over 90% of hybrid and remote employees use a personal device for work every day. But as more people use their smartphones or laptops to access company resources the security risks for organisations increase dramatically making it unsurprising that more than half of UK businesses experienced some form of cybersecurity breach or attack last year alone.

Simple admin tasks such as sending a work email from a personal device can create vulnerabilities in an organisation’s network. Whether instituted as a formal policy or as an adaptation to the pandemic, bringing your own device (‘BYOD’ ) opens a company’s systems and platforms up to hacking, data loss, and insider threat. With 82% of employers having a BYOD policy in place, employers need to be aware of these concerns, as well as implement best practices to mitigate the risks.

Conor O’Neill, CEO and Co-Founder of leading online pen test vendor OnSecurity, shares more about BYOD security and how organisations and employees can make sure their devices are protected.

BYOD security: What are the risks of using personal devices at work?

Unsecured wifi networks

When employees connect their personal devices to public Wi-Fi networks like cafes and hotels, these networks are usually not secure or well protected against attacks. Mobile devices are at risk of having information accessed by an attacker if they communicate with a public network, and the data transmitted between the personal device and corporate systems can be captured.

Organisations can use VPN (or virtual private network) technology to protect themselves from risks related to unsecured Wi-Fi networks. This way, the VPN creates a tunnel between their personal device and corporate network so all data is sent over public Wi-Fi responsibly.

Data security breaches

Employees’ devices often lack robust and up-to-date antivirus protection which is normally present in company-issued laptops, leaving them vulnerable to malware and virus infections. These infections can spread to company networks, compromising critical systems and potentially leading to data loss or disruption of operations. Common threats include viruses that spread through email attachments and downloads, spyware that steals sensitive data and ransomware that encrypts files and demands payment for their release.

Research from the Anti-Phishing Working Group (APWG) revealed common threats and scams most often include a sense of urgency so look out for phrases like ‘update password now’ and ‘action required’.

Lost or stolen devices

Lost or stolen devices are potentially the biggest threat to BYOD security with 40% of data breaches caused by lost or stolen devices. When the wrong person finds a device, it can easily be infiltrated and mined for personal, internal and financial information.

The loss or theft of these devices poses a high risk of exposing confidential company data if adequate measures, such as encryption and remote wipe capabilities, aren’t implemented.

If an employee loses or has their device stolen it’s important to act immediately and report the loss. Companies should have measures in place to ensure you can wipe data from a laptop, tablet or phone remotely.

Mixing personal and business use

Bringing your own device to work means mixing business with personal use is inevitable. You can’t control whether your employees decide to shop online at compromised websites or whether they will misplace a device. While you can educate heavily on security best practices, you can’t guarantee that your employees won’t loan their devices to a friend or use public wireless connections to save data.

45% use the same password for work and personal accounts – reusing passwords exposes a user’s accounts to cybercriminals, which increases the risk of identity theft as well as sensitive data theft from their organisation. Employers must encourage employees to have strong and different passwords across their work accounts.

5 BYOD security strategies for the workplace:

  1. Implement a clear BYOD policy

A clear BYOD policy is essential for managing the risks associated with personal device use. This policy must outline the acceptable use of personal devices and guide security practices such as password protocols, approved apps and procedures in the event of device loss or theft.

  1. Multi-factor authentication (MFA) codes

Make sure you use strong passwords on smartphones, laptops, tablets, email accounts and any other devices or accounts where personal information is stored. Where possible, you should consider using multi-factor authentication. Multi-factor authentication is a security measure to make sure the right person is accessing the data. It requires at least two separate forms of identification before access is granted. For example, you use a password and a one-time code which is sent by text message.

  1. Enforce access control and monitoring

The implementation of strict access control measures and conducting regular audits ensures that only authorised individuals can access sensitive data, reducing the risk of data breaches. Monitoring access logs also enables the timely detection of suspicious activities or unauthorised access attempts, allowing for prompt response and mitigation.

  1. Regular training

A significant element of overall BYOD security is ensuring that employees are properly educated on the most common security threats and risks and given the knowledge of best practices for avoiding them. It also concerns knowledge about up-to-date practices for securely surfing the web and regularly updating the software. At the same time, employees must be trained on how to recognise and report potential security incidents affecting the organisation such as phishing attempts.

  1. Mobile device management

In case of loss or theft, a mobile device management program can enable IT departments to remotely “wipe” a device to ensure sensitive information is not exposed.

As the lines between personal and professional device use continue to blur, companies must proactively address the security challenges that come with BYOD environments. While personal devices offer flexibility and convenience, they also introduce vulnerabilities that can put sensitive company data at risk. By implementing clear policies, enforcing robust security measures and investing in regular employee training, businesses can reduce these risks. Ultimately, creating a secure, digital space is a shared responsibility—one that requires both employers and employees to stay vigilant and informed.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Outgrowing your MSP; businesses need a provider that scales with their growth

Winning with AI: How UK Fintechs Can Navigate Complexity and Lead Innovation

Rewiring the UK’s investment landscape with AI

3 Comments

  1. Pingback: Essential Security Measures for Protecting Personal Devices | Practice Business

  2. Pingback: Essential Security Measures for Protecting Personal Devices | Dealer Support

  3. Pingback: Essential Security Measures for Protecting Personal Devices | Edexec

Follow SME Today on Linkedin and share all the topics you find interesting
Get £100 of free trades - ii trading account

The Newsletter

Join our mailing list for the best SME stories, handpicked and delivered direct to your inbox every two weeks!

Sign Up
Events Calendar
    • Marketing
    June 25, 2025

    From PLT to Twitter X: Business Branding Decisions That Backfired

    June 20, 2025

    Fast fashion giant Shein accused of “dark marketing” – what does it mean for businesses?

    • Finance
    July 2, 2025

    Selling a business: The steps too many owners miss

    July 1, 2025

    Level 7 apprenticeship funding cuts will cost UK employers over £200m

    • Health & Safety
    July 1, 2025

    Temperatures Soaring: Is Your Workplace Becoming Unsafe?

    January 29, 2025

    UK takeaways guilty of shocking hygiene failures:

    • Events
    July 2, 2025

    As Seen on BBC Panorama – Brad Burton to Headline The South West Expo in Swindon

    June 19, 2025

    Windsor Expo Wows: A Showcase of Success, Innovation, and Local Business!

    • Community
    June 23, 2025

    Celebrating One Year In Fairford Supporting The Community

    June 2, 2025

    National Charity Accelerates Children’s Reading Through New Corporate Partnership

    • Food & Drink
    June 23, 2025

    England Cricket Captain, Ben Stokes OBE, takes a stake in Spencer Matthews’ alcohol-free spirits brand, CleanCo

    June 16, 2025

    Hospitality industry risks collapse

    • Books
    April 24, 2025

    Values-Driven Professionalism: A Path to Client Loyalty

    December 2, 2024

    Banish the banshee boss: how to lead without fear – addressing the issue of fear-based management and how NOT to be this manager

    About

    SME Today is published by the same team who deliver The Great British Expos’. We have been organising various corporate events for the last 10 years, with a strong track record of producing well managed and attended business events across the UK.

    Join Our Mailing List

    Receive the latest news and updates from SMEToday.
    Read our Latest Newsletter:


    Sign Up
    X (Twitter) YouTube LinkedIn
    Most Recent Posts
    July 2, 2025

    As Seen on BBC Panorama – Brad Burton to Headline The South West Expo in Swindon

    July 2, 2025

    New Industrial Strategy must spark growth and opportunity for small businesses

    July 2, 2025

    Selling a business: The steps too many owners miss

    July 1, 2025

    Temperatures Soaring: Is Your Workplace Becoming Unsafe?

    July 1, 2025

    Outgrowing your MSP; businesses need a provider that scales with their growth

    Categories
    • Books
    • Community & Charity
    • Education and Training
    • Environment
    • Events
    • Features
    • Finance
    • Food and Drink
    • Health & Safety
    • HR & Recruitment
    • In Profile
    • Legal
    • Marketing
    • News
    • Property & Development
    • Sponsored Content
    • Technology
    • Transport & Tourism
    • Wellbeing & Mental Health

    Copyright © 2020 SME Today.

    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Privacy
    • Contact
    Copyright © 2025 SME Today.
    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Privacy
    • Contact

    Type above and press Enter to search. Press Esc to cancel.